Privilege Escalation in eNet SMART HOME Server by JUNG
CVE-2026-26369
9.3CRITICAL
What is CVE-2026-26369?
In versions 2.2.1 and 2.3.1 of the eNet SMART HOME server, a security flaw exists that allows low-privileged users to exploit insufficient authorization checks. By crafting a specific POST request to the /jsonrpc/management endpoint and manipulating the setUserGroup method, an unauthorized user can elevate their privileges to that of an administrator. This vulnerability permits them to alter critical configurations, giving them control over device settings and network parameters, unlawfully compromising the integrity of the smart home system.
Affected Version(s)
eNet SMART HOME server 2.3.1 (46841)
eNet SMART HOME server 2.2.1 (46056)
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
LiquidWorm as Gjoko Krstic of Zero Science Lab
